Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

unified scheme for protecting other-resource access #604

Open
joel-bluedata opened this issue May 9, 2022 · 0 comments
Open

unified scheme for protecting other-resource access #604

joel-bluedata opened this issue May 9, 2022 · 0 comments
Labels
Priority: High Project: Cluster Reconcile beyond simple xlate of model to K8s spec Project: KD Admin post-deployment admin tasks & config Type: Enhancement
Milestone

Comments

@joel-bluedata
Copy link
Member

KubeDirector has a high level of privilege, and as a kdcluster creator/editor you can ask it to do lots of things, including getting information and/or contents from other resources like secrets, configmaps, and other kdclusters. Depending on the type of resource and the kind of access we have a range of "are you allowed to do that checks" ranging from no-check, to checking the resource name prefix, to a full on SubjectAccessReview. This is confusing and makes it more probable that KD users will be allowed to do something that the deploying/configuring admin did not intend.

For the 1.0 release (or earlier) we should do a pass over this to have a more consistent scheme. Maybe "SubjectAccessReview in all cases" is the correct answer, maybe not, but let's decide.

@joel-bluedata joel-bluedata added Priority: High Type: Enhancement Project: Cluster Reconcile beyond simple xlate of model to K8s spec Project: KD Admin post-deployment admin tasks & config labels May 9, 2022
@joel-bluedata joel-bluedata added this to the 1.0.0 milestone May 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Priority: High Project: Cluster Reconcile beyond simple xlate of model to K8s spec Project: KD Admin post-deployment admin tasks & config Type: Enhancement
Projects
None yet
Development

No branches or pull requests

1 participant